CIPT Flashcards

(279 cards)

1
Q

Accountability

A

The introduction of technical and organizational measures for appropriate handling of personal data according to the law, which is an idea mentioned in GDPR and the Fair Information Practice Principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstract

A

To restrict the level of detail shared when processing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control entry

A

An element that governs, oversees, or rec-ords access to an object by an identified user in an access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control list

A

A list of access control entries that correspond to an object. This could be either discretionary, meaning controlling access, or system, meaning monitoring ac-cess via security event log or audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active Data Collection

A

When an end user purposely provides information, usually through web forms, text boxes, check boxes, or radio buttons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AdChoices

A

A Digital Advertising Alliance program that pro-motes awareness and choice for online adver-tising. Participating DAA members’ websites need an icon near their advertisements or the bottom of their pages. Users set preferences for behavioral advertising by clicking on the icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adequate level of protection

A

Confirmation that a data transfer accounts for the rule of law and legislation, respect for human rights, data protection rules, professional rules and security measures, data subject rights, independent supervi-sory authorities, and any international commitments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advanced encryption standard

A

An encryption algorithm that the US government us-es for security sensitive non-classified material. NIST selected this algorithm in 2001 to replace the Data Encryption Standard (DES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adverse action

A

Any business, credit, or employment action that affects consumers negatively, such as denying or can-celing credit, insurance, employment, or promotion. A credit transaction where the consumer accepts a counteroffer would not count.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Agile development model

A

As opposed to the plan-driven development model, this process for software system and product design integrates new system requirements during the literal creation of the system, where specific portions are developed one at a time. The Scrum Model is one ex-ample.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Algorithm

A

A mathematical instruction applied to a set of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anonymization

A

The process by which individually identifiable data is changed so that it can no longer be related back to any individual without affecting the usability of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anonymous information

A

Data that is not related to an identified or an identifi-able natural person, nor can it be combined with oth-er information to re-identify persons. Being made un-identifiable, it is not in scope for the GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anthropomorphism

A

The act of placing human characteristics or behaviors on non-living things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-discrimination laws

A

Indications of special classes of personal data. If these exist based on a class or status, it is likely that the personal information is subject to more prescrip-tive data protection regulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application or field encryption

A

The ability to encrypt certain regions of data, particu-larly sensitive data including health-related infor-mation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application-layer attacks

A

Attacks that take advantage of flaws in network server applications, which are present in applications such as web browsers, e-mail server software, and network routing software. Patches and updates to applications can help protect against such attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Appropriation

A

Adopting one identity for another person’s uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asymmetric encryption

A

A type of data encryption using two distinct but relat-ed keys to encrypt data: a public key for other par-ties, and a private key only for the first party. You need both keys to decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attribute-based access control

A

A permission model for access control made by review-ing attributes given to users, data, and the context of requested access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Audit trail

A

A track or record of electronic activity used for mon-itoring or validation in tracking customer activity or investigating cybercrimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authentication

A

Determining whether an entity is who it claims to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Authorization

A

The process for deciding if the user should have access to a specific resource like an information asset or sys-tem containing and validating the identity of the user. The criteria could include things like organizational role, security clearance, and applicable law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Automated decision making

A

The process of making a determination apart from human involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Basel III
An inclusive list of reform measures created by the Basel Committee on Banking Supervision to build up the regulation, supervision, and risk management of the banking sector.
26
Behavioral advertising
Advertising targeted at individuals based on observa-tions about their activity over time, likely done via au-tomated processing of personal data, or profiling.
27
Big data
Large sets of information that organizations may collect due to the expansion of the amount and availability of data. It’s also referred to as “the three V’s”: volume, variety, and velocity, referring to the amount of data, the type of data, and the speed at which data can be processed.
28
Biometrics
Data that relates to the physical or behavioral charac-teristics of a person, for example fingerprints, voice, or handwriting. This is considered a special category of data with processing only permitted in certain cir-cumstances under GDPR.
29
Blackmail
The threat of sharing a person’s information against their wishes. An
30
Breach disclosure
An organization must notify regulators and/or vic-tims of incidents that have impacted the confidenti-ality and security of personal data. This transparen-cy mechanism brings light to operational failures, helps mitigate harm, and assists in the identification of causes of failure.
31
Breach of confidentiality
Sharing a person’s personal information in spite of a promise otherwise.
32
Bring your own device
Allowing employees to use their own personal compu-ting device for work.
33
Browser fingerprinting
Differentiating between users from the instance of their browsers, which store information about webpages visited, making each unique due to ac-cess time and order.
34
Caching
Saving local downloaded copies so that there’s no need to keep downloading content, which should be prohibited on pages that display personal infor-mation.
35
California Online Privacy Protection Act
This act requires that all websites targeted to California citizens must provide a privacy statement to visitors with an easy-to-find link. Websites that collect personal data from individuals under 18 years of age must per-mit those children to delete their data. Websites are required to inform visitors of which Do Not Track mechanisms they support, if any.
36
CCTV
An acronym for “closed circuit television” which has become shorthand for any video surveillance sys-tem. These can be hosted via TCP/IP networks and accessed remotely, and the footage very easily shared.
37
Chat bots
Automated intelligence that mimics human interac-tions and can be used for simple customer requests and interactions.
38
Children’s Online Privacy Protection Act (COPPA) Choice
U.S. federal law applying to operators of commercial websites and online ser-vices either directed to children under the age of 13 or known to collect per-sonal information from children under the age of 13. Operators are required under this law to post a privacy notice on the website, provide notice about collection practices to parents, obtain verifiable parental consent before col-lecting personal information of children, give parents the choice about wheth-er their child’s personal information will be shared with third parties, provide parents with rights to access, delete, and opt out of future collection or use of the information, and maintain the confidentiality, security and integrity of children’s personal information.
39
Choice
The concept that consent must be freely provided and data subjects have a true choice whether to provide personal data, without which it is unlikely the consent would be considered valid under GDPR.
40
Ciphertext
Data that is encrypted.
41
Cloud computing
Provisioning information technology services online from a third-party supplier or by a company for its in-ternal users. The services could be things like software, infrastructure, platforms, or hosting, with applications like email or data storage.
42
Code audits
The analysis of source code’s discovery of flaws, se-curity breaches, or violations in the technology eco-system.
43
Code reviews
Reports organized by code authors with a reader, moderator, and privacy specialist.
44
Collection limitation
The fair information practices principle which says that there should be limits in the collection of personal da-ta, where data should be gathered by fair and lawful means with the knowledge or consent of the data sub-ject.
45
Communications privacy
The class of privacy that encompasses protection of the means of correspondence, including mail, phone conversations, and email.
46
Completeness arguments
Assertions used to confirm compliance with privacy rules and policies in the design of new software sys-tems, where privacy rules are compared to the re-quirements used for a software system. This accounts for necessary technical safeguards and prohibits de-sign that would violate privacy regulations.
47
Computer forensics
Searching an information system for relevant clues after a compromise of security.
48
Concept of operations
An outline for the functionality of a software product or system as used in plan-driven development models to project design and implementation.
49
Confidentiality
The principal that data should be protected against unauthorized or unlawful processing.
50
Consent
The confirmation of an individual’s agreement to the collection, use, and disclosure of their personal data. There are two thoughts on this: opt-in (making an affirmative action) and opt-out (implied by lack of ac-tion).
51
Content delivery network
The servers containing the visible elements of a web page which would be signaled for those elements. In advertising, a general ad server would be signaled after a webpage is requested and search for information on the user trying to access the webpage.
52
Context aware computing
When a device adapts to its environment by changing location, video, audio, or brightness.
53
Context of authority
Resource access control on a network depends on the context in which the employee connects to the net-work.
54
Contextual advertising
Advertising using content from a visited webpage or user query. It’s a widely used form of online targeted advertising.
55
Contextual integrity
A way of ranking potential privacy risks in software systems and products considering how the product or system compares to consumer expectations. If a product or system differs from expectations, it’s possible that the consumer may perceive a privacy harm.
56
Cookie
A small text file stored on a client machine to be re-trieved by a web server. These keep track of the end user’s browsing activities and pool individual requests into sessions. They also allow users to stay signed in. Types include first party, third party, session, and per-sistent. Consent is required before collecting.
57
Coupling
The connection between objects within a technology ecosystem which controls the flow of information. Fo-cusing makes objects depend on the connection to other objects, while loosening eases the dependency, isolating processing to a specific group of classes and reducing the chance of accidentally re-purposing infor-mation.
58
Cross-site scripting
Code input by malicious web users into web pages that other users will view.
59
Cryptography
Hiding information, usually by transforming it with encryption, such as digital signature, or non-repudiation.
60
Cryptosystem
The information required to encrypt and decrypt a particular message, most often the encryption algorithm and the security key.
61
Customer access
A customer’s right to access, review, correct, and de-lete the personal information collected about them.
62
Customer data integration
The combination and management of all customer in-formation, a key element of customer relationship management.
63
Customer information
As opposed to employee information, this is data concerning the clients of private-sector organizations, healthcare patients, and the general public in relation to public-sector agencies.
64
Cyberbullying
Releasing a person's private information or re-characterizing the individual online.
65
Dark patterns
Habitual means to mislead individuals into sharing personal information.
66
Data aggregation
Combining data sets to analyze trends while maintaining individual privacy using groups of individuals with similar characteristics. The data set needs to come from a large number of individuals, be broadly categorized, and exclude data unique to a single individual.
67
Data breach
The unauthorized collection of computerized data that interrupts the security, confidentiality, or integrity of personal information maintained by a data col-lector.
68
Data centers
Facilities where data and critical systems are stored and managed, either centralized for one organization’s data management needs or operated by a third-party provider.
69
Data controller
The natural or legal person, public authority, agency or any other body who alone or together decides the intentions and means of personal data processing.
70
Data elements
A piece of data with a distinct definition which can’t be whittled down further. Examples include date of birth, numerical identifier, or location coordinates. In isolation these may not be considered personal data but they would be when combined.
71
Data flow diagrams
A graphical depiction of how data flows in an information system and how the system runs to fulfill its purpose. These would be used by systems analysts creating information systems and management recreating the flow of data within organizations.
72
Data loss prevention
A term for the strategy to keep end users from sharing sensitive information with external ineligible sources and the software systems that help control what data end users can transfer.
73
Data masking
The means of de-identifying, anonymizing, or other-wise obscuring data to retain the structure but re-move the sensitivity of the content to create a data set for training or software testing.
74
Data matching
Comparing personal data collected from multiple sources to make decisions about the identified individuals.
75
Data minimization
The idea that data controllers would simply collect and process personal data that is relevant, necessary, and adequate to fulfill the specified purposes.
76
Data processing
Any operation or set of operations performed on personal data including alteration, collection, recording, restriction, storage, use, retrieval, disclosure, dissemination, combination, organization, erasure, or destruction, whether by automated means.
77
Data processor
The natural or legal person public authority, agency or other body not employed by the controller who processes personal data as instructed by the controller.
78
Data Protection Authority
Independent public authorities that oversee the application of data protection laws in the EU through guidance on data protection issues and complaints made by individuals of GDPR violations. One per EU member state with extensive enforcement power to impose fines of up to 4% of a company’s global annual revenue.
79
Data quality
The fair information practices principle that says personal data should be relevant, accurate, up-to-date, and complete. Four questions to consider: does it meet the business needs; is it accurate; is it complete; and is it recent?
80
Data recipient
The natural or legal person, public authority, agency, third party, or another body getting personal data by disclosure. This would not apply to public authorities getting personal data in the context of an EU or member state law inquiry.
81
Data schema
All of the constraints, entities, and relationships used to separate customer information.
82
Data subject
An identified or identifiable natural person about whom the organization has personal information.
83
Declared data
Personal information shared on a social network or website.
84
Deep learning
A subset of artificial intelligence and machine learning where tasks are performed repeatedly with increasing layers of data.
85
Demographic advertising
Online advertising based on an individual’s age, height, weight, geographic location, or gender.
86
Design patterns
Shared solutions to recurring problems which enhance program code maintenance by applying a common mental measure.
87
Design thinking process
A five-phase process of empathize, define, ideate, pro-totype, and tested, used alongside value-sensitive de-sign.
88
Differential identifiability
Establishing rules that limit the confidence that an in-dividual has assigned to an aggregated value.
89
Digital Advertising Alliance
A non-profit organization that creates standards for consumer privacy, transparency, and control in online advertising and enforces the self-regulatory standards created by the Digital Advertising Alliance including AdChoices.
90
Digital fingerprinting
Using log files to identify a website visitor, mostly for security and system maintenance purposes. A log file is typically made up of the IP address, a time stamp, the URL of the requested page, a referrer URL, and the visitor’s web browser, operating system, and font preferences.
91
Digital rights management
Overseeing access to and use of digital information and devices after sale. Usually done using access con-trol (denial) technologies for defending copyrights and intellectual property, claims that may be considered controversial because they prevent users from lawful use of the information and devices.
92
Digital signature
A means of ensuring the legitimacy of an electronic document, such as an e-mail, text file, spreadsheet or image file, so that anything added afterward makes it invalid.
93
Directive on privacy and electronic communications act 2002/58EC
A policy directive for the EU Member States recognizing how cookies help modern websites function and the user’s right to opt out. It was amended by the Cookie Directive 2009/136EC, which added a requirement for all websites using tracking cookies to obtain user consent unless the cookie is “strictly necessary.”
94
Disassociability
Reducing connections between data and individuals as much as possible in relation to the system opera-tional requirements.
95
Discretionary access control
A type of access control that permits the owner of an object to approve access to a computer-based information system.
96
Distortion
Disseminating false or incorrect information about someone.
97
Demilitarized Zone Network
A firewall configuration to protect local area net-works with a number of computers acting as a broker for traffic between the LAN and the external network.
98
Do Not Track
A potential policy allowing consumers the right to opt out of web tracking, in the same vein as the existing US Do-Not-Call Registry.
99
E-commerce websites
Websites offering online ordering, which allows access to information related to user purchases and payments for targeted advertising.
100
Electronic communications data
Defined by the ePrivacy Directive to include the content of a communication, traffic data, and location data.
101
Electronic communications network
Things that would fall under this definition include net-works used for radio and television broadcasting; trans-mission systems, switching or routing equipment, and other resources that send signals by electromagnetic means; electricity cable systems; fixed and mobile terrestrial networks; and cable television networks.
102
Electronic communications service
Any service allowing users to send or receive wire or electronic communications.
103
Electronic surveillance
Digital monitoring, such as location-based services, stored communications, or video surveillance.
104
Encryption
Obscuring information so that it can’t be read without a key or other specific knowledge, usually with a cryptographic scheme.
105
Encryption key
A cryptographic algorithm used on plain text to mask value or used on encrypted text to make it plain again.
106
End-user license agreement
A contract made between the user and the software application owner where the user promises to pay for the use of the software and comply with any restrictions.
107
Enterprise architecture
An abstract outline or blueprint of the structure and operation of an organization, usually in an effort to achieve current and future goals.
108
EU Data Protection Directive
The first EU-wide legislation protecting personal data use and privacy which was adopted in 1995 and re-placed by GDPR in 2018.
109
Exclusion
Denying an individual knowledge about or participation in data processing.
110
Exposure
Sharing information that would normally be kept private, including physical details about bodies.
111
Extensive markup language
Also referred to as XML, this markup language allows for the transport, creation, retrieval and storage of files from tags that identify the contents. The content of a web page is described in terms of the data produced as opposed to how it should be displayed, which is done in HTML.
112
Extranet
A network system made by connecting corporate intranets. These come with inherent security risks despite meeting organizational goals, including backdoors into the internal network and trust for third parties. Risk management would rely on a business contract to restrict access to data, list security controls in place, establish how shared devices will be managed, and create procedures for cooperating with technical staff.
113
Factors Analysis in Information Risk (FAIR) model
A framework that separates risk by frequency of action and breadth of violation.
114
Federated identity
A model to confirm a person's identity using a credible centralized service.
115
Financial Instruments and Exchange Law of Japan
A Japanese legislation for the financial services sector that created a cross-sectional legislative framework to protect investors, strengthened disclosure requirements, provided directions for financial exchange self-regulatory operations, and established strict rules to stop unfair trading.
116
First-party collection
A data subject gives personal data through a form or survey sent to the collector upon submission.
117
Flash
Software used to place animation and other visual effects on web-based content.
118
Frequency data
The number of times a particular value exists in the data set.
119
Functional system requirements
The details for implementation related to how a system should work, which inputs create which outputs, and elements of design.
120
Geo-social patterns
Data related to mobility, social patterns, and behaviors that comes from smartphones and other devices when people share their emotions, opinions, experiences and locations. Artificial intelligence and machine learning use these to identify meaningful patterns and trends.
121
GET Method
Attributes from this method, as opposed to the POST HTML method, prescribe how form data is provided to a URL, particularly in name/value pairs showing pass-words and other sensitive information in the browser’s address bar.
122
Global Privacy Enforcement Network
The collection of data protection authorities set by an OECD recommendation for collaboration among member countries on enforcing privacy laws, developing common priorities, sharing best practices, and sup-porting joint enforcement and awareness activities.
123
Globally unique identifier
An identifier that is special to an individual user.
124
Harm dimensions
Distinctions between types of dimensions of privacy harms—namely objective and subjective. Perceived harm can have the same privacy impact as experienced harm.
125
Hashing functions
Also called hashing, this refers to removing personal in-formation from user identifications using an organized system but retaining activity tracking. It can be used to encrypt or map data and in other information security applications.
126
Hide
Personal information is rendered unconnected or invisible to others.
127
High-level design
How the system's front and back ends collaborate to create the desired system behaviors.
128
Homomorphic
Allowing encrypted data to be viewed or changed without decryption.
129
Hyperlink
A graphic or text linked to a website or web-enabled service via URL in the HTML code. Upon selecting the right words or images, the end user is sent to the in-tended website or page.
130
Hypertext Markup Language (HTML)
A language for content authoring used to make web pages and render content. Some of the details that can be input include hyperlinks, pictures, headings, and text with minimal commands.
131
Hypertext Transfer protocol
A networking language that controls data packets via Internet. It sets rules related to the formatting and transmission of messages and actions to be taken by web servers and browsers according to commands.
132
Hypertext Transfer protocol secure
A network communication technique where HTTP is placed on top of the SSL/TLS to apply security capabilities.
133
Identifiability
The specificity to which a user is recognized by an authentication system. A user is more easily tracked or targeted with greater specificity and more easily falsely authorized with less.
134
Identifiers
Codes or strings that correspond to an individual, de-vice, or browser.
135
Information governance
Technical solutions, security measures, and privacy compliance efforts taken by stakeholders involved in the processing of personal data.
136
Information hiding
Dividing data into different levels of classification and restricting access to that data using class functions.
137
Information Life Cycle
This approach recognizes different values of data and data handling through an organization between collection and deletion. The stages involved are: collection, processing, use, disclosure, retention, and destruction.
138
Information Privacy
The class of privacy which refers to the right of individuals, groups, or institutions to determine when, how, and to what extent information about them is dis-closed to others.
139
Information Security
Protecting information in order to prevent loss, unauthorized access, and misuse. This includes measuring threats and risks to information and the processes and measures to be taken to preserve the confidentiality, integrity and availability of information.
140
Information utility
The ability for a business to use the information it’s collected in as many ways as possible to improve its services and products.
141
Insecurity
Failure to appropriately protect collected personal in-formation.
142
Interactive advertising bureau
The trade association for businesses in the advertising industry that creates industry standards, leads research, and supplies legal support.
143
Internet of Things
A term referring to the myriad of devices people own that connect to the internet and are subject to automation and remote access.
144
Internet Protocol Address
A unique string of numbers tied to a computer on the Internet or other TCP/IP network. This is considered a type of personal information.
145
Internet Service Provider
A company giving Internet access to homes and businesses via modem dial-up, DSL, broadband, or wireless connections.
146
Interrogation
Probing or leading individuals down a line of question-ing to ascertain their personal information with the possibility of risking individual privacy and social norms if a person is compelled to answer.
147
Intrusion reports
The result of auditing a system for threats to network security.
148
ISO 27002
A code of practice for information security made up of potential controls and mechanisms for implementing effective organizational and security management practices.
149
IT Architecture
Also called enterprise architecture, this is made up of policies, principles, services, and products adopted by IT providers.
150
IT Department
The part of an organization charged with overseeing the technology used to create, store, transfer, and use information.
151
Javascript
A computer programming language that creates interactive effects on web browsers.
152
Just-in-time notification
Distinct information practices shared along with a con-sent request before information is collected.
153
K-anonymity
A practice where direct identifiers are replaced with generalized, truncated, or redacted identifiers.
154
L-diversity
A practice where at least "l" distinct values are used on top of replacing direct identifiers with generalized, truncated, or redacted identifiers in every group of k records for sensitive attributes.
155
Layered notice
A privacy notice with sections of different lengths--a shorter version with key points and a longer, more de-tailed version.
156
Layered security policy
A layered approach with three levels of security policies: a high-level document including the policy statement; the controls to be followed to meet the policy statements; and the operating procedures, about how the policy statements will be achieved in practice.
157
Least privilege
A security control allowing access according to the lowest possible level to complete the required action.
158
Linkability
The capacity for identifiers used to track an individual to be combined with outside information and identify an individual.
159
Local area network
Networks located inside the operational facility which are easy to manage and subject to local control.
160
Local shared objects
Also known as flash cookies, these data files are made to track user preferences and used by Adobe Flash Player. They are different from HTTP cookies in being saved to the computer’s hard drive.
161
Location-Based Service
Services that use location information to provide applications and services, including gaming, social networking, and entertainment, usually needing geolocation to identify the real-world geographic location.
162
Logs
A record of all events that take place in a computer system (usually an operating system). An application log includes events tracked by applications; a system log includes events recorded by the operating system; and a security log includes security events
163
Low-level design
The specific details describing a high-level de-sign system.
164
Magnitude data
Data where the quantity of interest is presented over all units of analysis. A table showing average income by age is one example.
165
Manageability
The ability to govern personal information in a detailed way, through things like correction, transfer, and deletion.
166
Mandatory access control
An access control system where the system restricts access to data.
167
Metadata
A piece of data that pertains to other data.
168
Microdata sets
Anonymized groups of information about individuals, where the individuals can’t be identified.
169
Mobility
The capability of a system to change locations, like that of laptops or mobile phones.
170
Multi-factor authentication
The authentication process using multiple verification methods, like a password and code sent to a phone number, or log-in and biometric identifier.
171
National Initiative for Cybersecurity Education's Cybersecurity Workforce
This framework created common terminology in cyber-security for all sectors.
172
National Institute of Standards and Technology (NIST) framework
A risk management tool used to establish guidelines and best practices to the management of cybersecurity-related risks, help organizations communicate and plan around privacy risk, and build privacy governance pro-grams.
173
Natural language generation
Information made into content, which allows things like text-to speech, automation of reports, and mobile applications content.
174
Natural language understanding
Machine reading comprehension via algorithms used to find and extract language that the computer can interpret.
175
Network centricity
The degree to which personal information stays local.
176
Network devices
The components allowing two devices to connect for sharing electronic files, such as printers and fax ma-chines. The most common ones make Local Area Net-works using a hub, a router, a cable, a modem, and network cards.
177
Network encryption
Protecting data transfers at the network transfer layer via encryption that is invisible to the end user.
178
Network-layer attacks
Attacks abusing the basic network protocol for ad-vantage, mostly through spoofing a network address to send data to an intruder instead of the intended recipient or service disruptions through a denial-of-service attack that overloads the capacity of a website’s domain with brute force.
179
Noise addition
The type of anonymization where certain identifying values from one data subject are swapped with identifying values from another subject from the data set.
180
Non-functional system requirements
Abstract concepts informing the functional requirements for a new software, system, or product being developed—as in how a system should work instead of the technical processes or functions.
181
Obfuscation
Making something harder to understand in order to hide its meaning.
182
Objective harm
Harm that is measurable and observable resulting from privacy violations to a person.
183
OECD Guidelines
A universal set of internationally accepted privacy principles and guidance for countries developing regulations related to cross-border data flows and law-enforcement access to personal data. The principles are Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Openness, Individual Participation, and Accountability.
184
Omnibus Laws
Laws covering a wide range of organizations or natural persons, not simply a specific market sector or population.
185
Online behavioral advertising
Websites or online advertising services that track and analyze search terms, demographics, online activity, offline activity, browser or user profiles, location data, or preferences, to offer advertising.
186
Online data storage
Third-party vendors storing data accessible via Internet as an alternative to local storage on a hard drive or portable storage on a flash drive.
187
Open source vs. closed source
Software that can be simply viewed, shared, or edited compared to that which can only be fixed and updated by the vendor.
188
Opt-in
One of two approaches to choice, where an individual makes an affirmative indication of agreement, like checking a box to allow the business to disclose the in-formation to third parties.
189
Opt-out
One of two approaches to choice, where the lack of action on the part of the individual is taken as their implication of choice, so for example, their information will be shared with third parties if they don’t uncheck a box.
190
Organization for Economic Cooperation and Development
An international organization that supports policies created to boost employment, sustainable economic growth, and the standard of living.
191
Passive collection
Collecting data unbeknownst to the data subject.
192
Patches
Making program changes to update or fix a system.
193
PCI Data Security Standard
A self-regulatory system of security standards for payment card data drafted by the Payment Card Industry Security Standards Council. Compliance necessitates companies above a certain threshold to conduct third party security assessments.
194
Perimeter controls
Technologies and processes intended to secure the network by stopping access from the outside.
195
Persistent storage
Storing data in a stable medium such as a hard drive. An alternative to random access memory, which loses data whenever the device is disconnected from power.
196
Personal information
Also called personal data, a term defined by CCPA as information that identifies or could be linked to a particular consumer.
197
Pharming
Corrupting a host file or network router to send an authentic internet request to a malicious website.
198
Phishing
Communication meant to trick a user to give a pass-word, account number, or other information to a web-site managed by the attacker. It’s called “spear ” when the attack is targeted to a specific user, like an e-mail that looks like it’s from the user’s boss.
199
Plan-driven development model
As opposed to the agile development model, this strategy to creating software and systems involves fully de-signing the system and functions before creation, one example being the Spiral model.
200
Platform for privacy preferences project
A project intended to introduce user privacy into web protocols. The most successful protocol from this project is XACML.
201
Polymorphic
An algorithm changed when the code is copied, while the encryption stays the same for each key.
202
POST Method
As opposed to those of the GET method, this method’s attributes specify how form data is given to a web page in a more secure way.
203
Predictability
An indicator of the reliability of assumptions made about a system, specifically the data it holds and how it is processed.
204
Premium advertising
The costliest and most pronounced type of web advertising displayed on a website’s homepage which only big name companies can afford.
205
Privacy by Design
Generally regarded as a synonym for Data Protection by Design, this is an approach where privacy is embedded into technology, systems, and practices from early de-sign stage to include privacy requirements in the processing of personal information. It ensures the existence of privacy from the outset.
206
Privacy engineering
A concept in which privacy values and principles are considered in technology systems and programs while protecting security and mitigating risk, requiring engineers and privacy professionals to work together.
207
Privacy notice
A statement provided to the data subject explaining how an organization collects, uses, stores, and discloses personal information.
208
Privacy nutrition label
A standard label designed to make privacy policies more understandable, developed by the lab at Carnegie Mellon University.
209
Privacy Officer
An individual designated as the head of privacy compliance and operations in an organization. The US federal government sees this person as the official in charge of the implementation and management of all privacy and confidentiality efforts.
210
Privacy patterns
Borrowing from design patterns, these are common solutions to privacy problems encountered in software design.
211
Privacy policy
An internal statement that explains an organization or entity’s handling of personal information to the members of the organization interacting with the personal in-formation, informing them about the collection, use, retention, and destruction of the data and data subject rights.
212
Privacy review
An analysis of how well new comply with the organization’s privacy policy to minimize potential privacy risks.
213
Privacy risk
A formula used to determine the impact a new project may have on the privacy of the consumer base involved. In the evaluation, the likelihood of the threat taking place should be considered along with its potential impact. Then, projects should be compared in terms of their resulting risk.
214
Privacy standard
The minimum level of privacy protection to be placed in all new projects, applications, and services both in terms of internal organizational policy and external regulations. There should be guidelines to help reach adherence.
215
Privacy technologist
A term for technology professionals who play a role in protecting privacy in technology. These could be audit, risk and compliance managers; data scientists; soft-ware engineers; or privacy engineers.
216
Protected health information
Any individually identifiable health information created, received, transmitted, or stored by a HIPAA-covered entity or its business associate or employee which can be used to identify the individual is created or received by a covered entity or an employer and is related to any physical or mental condition or payment or provision of healthcare.
217
Protecting Canadians from Online Crime Act
An act that criminalizes cyber bullying and allows police to obtain warrants for telecommunications and internet data and hold onto electronic evidence.
218
Pseudonymous data
Data points no longer directly associated with an identified person although it’s known whether multiple of the data points relate to the same person. An ID is used instead of PII to tell if data has the same source. Examples include IP address, GUID, and ticket numbers.
219
Psychographic advertising
Sending a user content based on their interest deter-mined by their known preferences online rather than their interactions with web pages and advertisements.
220
Public key infrastructure
A system composed of digital certificates, authorities, and other registration entities that uses cryptography to check the authenticity of each party participating in an electronic transaction.
221
Public records
Information gathered and stored by a government entity that it makes available to the public.
222
Quality attributes
Software development issues that cannot be fixed by one design element or function alone, one example being privacy. Implementing Privacy by Design in soft-ware development will help to account for the issues in all system functions.
223
Quantum encryption
The use of quantum mechanics principles to encrypt messages so that no one other than the intended recipient can view them.
224
Radio-Frequency Identification
Technologies that identify people or objects with microchips using radio waves.
225
Re-identification
The action of reapplying characteristics to pseudonymized or de-identified data that could be used to identify an individual. There is risk in undoing the de-identification actions applied to data.
226
Remnant advertising
The simplest form of web advertising, lacking personalization because no data about the user or webpage is used.
227
Repurposing
The secondary use of information collected for a different purpose.
228
Retention
The part of the information life cycle that pertains to organizations keeping personal information only as long as required to fulfill the intended purpose.
229
Right of access
The right of an individual to ask and obtain their person-al data from a business or other organization.
230
Role-based access control
Access policies following the restriction where no employee can gain greater information access than what is necessary to perform their job.
231
RSA Encryption
The most prevalent inter-net encryption and authentication system which uses an algorithm to generate a public key, which is then used to encrypt data and decrypt an authentication, and a private key, which can decrypt the data and encrypt an authentication.
232
Run time behavior monitoring
Auditing and evaluating data collected from an operating system.
233
Seal programs
Programs requiring participants to follow codes of in-formation practices which will be monitored. The companies that comply with the terms will show the pro-gram’s seal on their website.
234
Secondary use
The use of an individual's information for purposes that are unrelated to the original processing purpose without consent.
235
Secret key
A cryptographic key that corresponds to a private cryptographic algorithm, connected to one or more entities. The key should be protected from disclosure.
236
Security policy
Internal security measures that prevent unauthorized or unnecessary access to corporate data or resources, which may be either physical, technical, or organizational. Protected resources may be intellectual proper-ty, financial data, or personal information.
237
Security safeguards
The fair information practices principle establishing that personal data be protected by acceptable security safeguards from risks of loss or unauthorized access, destruction, use, modification, or disclosure of data.
238
Separate
Processing personal data in a way that prevents identification of the individual, either using physically separate locations or isolating the data by purpose.
239
Single-factor authentication
The standard authentication technique where a user name and password are provided for access.
240
Single-sign-on
An authentication method where the user provides one set of credentials to access multiple applications.
241
Social engineering
A term for a security vulnerability created by attackers persuading a user to provide information.
242
Software requirements specification
Formal documentation of a software system or product with functional and nonfunctional requirements that cover the needs of the customer.
243
SPAM
Commercial e-mail that is unsolicited.
244
Spear phishing
Phishing that is meant to reach a group of people connected to a specific organization.
245
Speech recognition
Voice command technology permitting users to speak to technologies in order to control them.
246
SQL injection
Targeting SQL forms with commands entered into in-formation entry boxes which may alter the system. This could erase data sets or over load servers if the SQL is left vulnerable.
247
Storage encryption
Using encryption to protect stored or backed-up data in transit and at rest.
248
Structured query language
A programming language made by IBM that uses inter-active forms into which users can insert or edit data to be made into usable data sets by the system administrators. It’s now an international standard for the col-lection and use of information.
249
Subjective harm
Only an expectation of harm existing, lacking anything perceptible or quantitative.
250
Super cookie
A tracking tool that remains in a device even after deleting all cookies, kept in different types of storage.
251
Surveillance
Capturing or watching an individual's activities.
252
Surveillance collection
Collection of data made by observing a data subject without interfering in their activity.
253
Symmetric key encryption
A form of encryption where a single secret key is used to both encrypt and decrypt data, also called Secret Key Encryption.
254
Syndicated content
Content that is created, bought, or licensed from a third party that may introduce malicious code into the organization’s website code. Cross-site scripting (XSS) attacks may take advantage of this vulnerability.
255
Systems development life cycle
A conceptual model used to follow an information system development project through various stages.
256
T-closeness
Decreasing the detail of the data in a data set to extend l-diversity.
257
Terms of service
A set of rules governing the use of a service to which a user agrees implicitly or explicitly before participating.
258
Third-party collection
Data taken from a source that is not the data subject.
259
Tokenization
Replacing random tokens for true data as way of de-identifying data.
260
Transfer
Moving information from one organization to another intended recipient.
261
Transient storage
Short-term data storage such as that used by a session cookie stored on a browser which will be erased once the browser is closed.
262
Transmission control protocol
A protocol allowing two devices to connect and transfer data. TCP and IP are combined to send data over the Internet in the form of a packet, made up of content and a destination.
263
Transport layer security
A protocol that maintains separation between client-server applications and Internet users. The connection is secured to make sure no third party has access when a server and client communicate.
264
Trojan horse
A type of malware where bad software looks like beneficial software.
265
Ubiquitous computing
Processing information connected to an encountered activity or object.
266
Unified modeling language
A notation language used to detail the elements of a system design for software development.
267
Uniform resource locator
The letter and number coordinates that an end user in-puts into a web browser to get to a website; for example, https://privacyref.com.
268
User stories
Stipulations for new software systems or products created using the Agile Development Model, typically comprised of a few sentences on how a consumer would use the system or product and its intended functionality. This is a way of informing the developers about how a system or product should operate while they are design-ing it.
269
User-based access controls
Determining whether to grant or deny access to the re-source based on the identity of the user.
270
Value-added services
Non-core services that are outside of voice calls and fax transmissions available at almost no cost to pro-mote the business.
271
Value-sensitive design
An approach to design with moral and ethical values in mind like privacy, trust, courtesy, or freedom from bias for both technologies and stakeholders.
272
Virtual private network
A network that mostly uses public telecommunication infrastructure such as the Internet to allow remote users access to a central organizational network. The re-mote user is typically authenticated and data is se-cured using encryption technologies to prevent unauthorized disclosure of information.
273
Voice over internet protocol
A technology to let phone calls be made over an LAN or the Internet, in a similar risk to network-connected PBX systems but with the extra risk of data interception if using an unsecured connection.
274
Vulnerability management
Evaluating and creating plans for the possibility that a threat actor will succeed.
275
Web beacon
Also called a web bug, pixel tag or clear GIF, this is a clear graphic image delivered via web browser or e-mail which records a user’s visit or views. It may be used along with a web cookie for third-party tracking. They can be used to create specific profiles of user behavior or reports on what e-mails are opened. Similar privacy considerations should be made here to those for cookies.
276
Whaling
Phishing targeted at wealthy individuals.
277
Wide area network
A non-localized network for sending data across far distances.
278
Worm
A computer program or algorithm that clones itself over the network and completes malicious actions.
279
Write once read many
A data storage device that doesn’t allow information to be modified after it is written to ensure that the data originally written to the device won’t be manipulated. The data can only be destroyed if the whole device is destroyed.